There are a few tricks to making passwords that will at least slow down cybercriminals – buying you time to reset your accounts if a list of encrypted passwords leak in a data breach.
Micro-blogging site Tumblr has warned users that passwords can be “sniffed” from its iPhone and iPad apps – and issued a “very important” security update for both apps.
What needs to happen before the President of the United States can stand before the American people and assure them that a comprehensive and good faith effort has been made to stop cyber attacks disrupting the delivery of essential goods and services? The NIST workshops are seeking answers to that question.
A Texas restaurant chain is suing one of its suppliers over a point-of-sale system which allowed hackers to steal customer data – claiming that card-processing giant Micros Systems supplied units which failed to meet security guidelines.
A $250 signal-boosting device for cellphone users can be hacked, two researchers claim – offering total access to phone calls, internet use and text messages on devices connected to the “femtocell”.
Browser security warnings can work to protect users from phishing and malware sites – but “warning fatigue” means important alerts over site security can be conmpletely ignored.
A new biometrics system could “read” blood vessels under the skin using thermal imaging cameras – a system which its inventors claim would be “almost impossible to spoof.”
Cyber risk has shot up in importance for company CEOs and senior executives, according to an Ipsos survey for Lloyds Risk Index 2013.
A Kremlin security agency has ordered $15,000 of electric typewriters – sparking international gossip about a return to “old school” security measures.
Facebook’s Graph Search is quietly rolling out to U.S. users this week – a powerful new tool which can reveal information people might have forgotten they ever “shared”. Our tips will help keep private information safe.
Governments around the world are recruiting “cyber-mercenaries” – groups of skilled cyber professionals who target institutions such as banks and energy companies, British politicians have warned.
“Bug bounties” paid out for finding and reporting bugs and vulnerabilities are a cheap and effective way for companies to bolster their security, an independent study by UC Berkeley researchers has found.
A U.S. Government department threw away IT components including printers, computer mice and keyboards in an effort to root out a “sophisticated” and “persistent” malware threat – which did not exist.
My colleagues at ESET Ireland, report that an all-too-familiar scam is currently hitting Irish mailboxes. I’ve talked about it at some length here previously – for instance here and here – but here’s a quick summary. Someone, apparently someone you know (a friend or a family member) contacts you to tell you that they’ve been
In the ongoing effort to protect cyber aspects of America’s critical infrastructure, the third NIST Cybersecurity Framework workshop is being hosted July 10-12, 2013 by the University of California, San Diego, and the National Health Information Sharing and Analysis Center.
I made a comment recently that was subsequently quoted in a recent ESET blog – Android “master key” leaves 900 million devices vulnerable, researchers claim – and it appears that comment may have confused one or two people. What I actually said was this: “Security based on application whitelisting relies on an accurate identification of
The threat of cyber attack loomed over the opening ceremony for the London Olympics last year, officials have revealed.
A sustained brute force cyber attack battered Nintendo’s defences for a month this summer – and allowed cybercriminals access to private data such as names, addresses and phone numbers for up to 24,000 accounts.
Investment research firm Morningstar says that personal information including credit card numbers for clients, email addresses and passwords may have been compromised during an intrusion into its systems in April 2012.